US8904529B2 - Automated deployment of protection agents to devices connected to a computer network - Google Patents
Automated deployment of protection agents to devices connected to a computer network Download PDFInfo
- Publication number
- US8904529B2 US8904529B2 US11/517,165 US51716506A US8904529B2 US 8904529 B2 US8904529 B2 US 8904529B2 US 51716506 A US51716506 A US 51716506A US 8904529 B2 US8904529 B2 US 8904529B2
- Authority
- US
- United States
- Prior art keywords
- network
- computer
- program
- inter
- identified
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active, expires
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0272—Virtual private networks
Abstract
Description
Claims (10)
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US11/517,165 US8904529B2 (en) | 2005-09-07 | 2006-09-07 | Automated deployment of protection agents to devices connected to a computer network |
US14/337,825 US9325725B2 (en) | 2005-09-07 | 2014-07-22 | Automated deployment of protection agents to devices connected to a distributed computer network |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US71460505P | 2005-09-07 | 2005-09-07 | |
US11/517,165 US8904529B2 (en) | 2005-09-07 | 2006-09-07 | Automated deployment of protection agents to devices connected to a computer network |
Related Child Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US14/337,825 Continuation US9325725B2 (en) | 2005-09-07 | 2014-07-22 | Automated deployment of protection agents to devices connected to a distributed computer network |
Publications (2)
Publication Number | Publication Date |
---|---|
US20070056020A1 US20070056020A1 (en) | 2007-03-08 |
US8904529B2 true US8904529B2 (en) | 2014-12-02 |
Family
ID=37836405
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US11/517,165 Active 2031-07-18 US8904529B2 (en) | 2005-09-07 | 2006-09-07 | Automated deployment of protection agents to devices connected to a computer network |
US14/337,825 Active 2027-01-17 US9325725B2 (en) | 2005-09-07 | 2014-07-22 | Automated deployment of protection agents to devices connected to a distributed computer network |
Family Applications After (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US14/337,825 Active 2027-01-17 US9325725B2 (en) | 2005-09-07 | 2014-07-22 | Automated deployment of protection agents to devices connected to a distributed computer network |
Country Status (5)
Country | Link |
---|---|
US (2) | US8904529B2 (en) |
EP (1) | EP1934743A4 (en) |
JP (1) | JP4743911B2 (en) |
CN (1) | CN101258470B (en) |
WO (1) | WO2007030506A2 (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10958557B2 (en) * | 2019-07-31 | 2021-03-23 | International Business Machines Corporation | Automated deployment of a private monitoring network |
US11496508B2 (en) | 2019-09-24 | 2022-11-08 | Target Brands, Inc. | Centralized security package and security threat management system |
Families Citing this family (22)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7581000B2 (en) * | 2005-01-11 | 2009-08-25 | Ricoh Company, Ltd. | Monitoring device having a memory containing data representing access information configured to be used by multiple implementations of protocol access functions to extract information from networked devices |
US7512681B2 (en) * | 2005-09-26 | 2009-03-31 | Ricoh Company Limited | Database for multiple implementation of HTTP to obtain information from devices |
US7526546B2 (en) * | 2005-09-26 | 2009-04-28 | Ricoh Company Limited | Method and system for use of abstract classes for script implementation of HTTP to obtain information from devices |
US20080133639A1 (en) * | 2006-11-30 | 2008-06-05 | Anatoliy Panasyuk | Client Statement of Health |
US8910275B2 (en) * | 2007-02-14 | 2014-12-09 | Hewlett-Packard Development Company, L.P. | Network monitoring |
JP2009015432A (en) * | 2007-07-02 | 2009-01-22 | Nec Soft Ltd | It asset management system using pc quarantine system, its method, and its program |
KR100917601B1 (en) * | 2007-07-03 | 2009-09-17 | 한국전자통신연구원 | Method and attestation system for preventing attestation relay attack |
US7899849B2 (en) * | 2008-05-28 | 2011-03-01 | Zscaler, Inc. | Distributed security provisioning |
JP5248445B2 (en) * | 2009-08-12 | 2013-07-31 | 株式会社野村総合研究所 | Communication agent, quarantine network system |
CN102195947B (en) * | 2010-03-15 | 2014-07-16 | 华为技术有限公司 | Lawful interception method and device |
JP5567906B2 (en) | 2010-06-04 | 2014-08-06 | インターナショナル・ビジネス・マシーンズ・コーポレーション | Apparatus and method for supporting screen reproduction |
US9065725B1 (en) * | 2010-09-14 | 2015-06-23 | Symantec Corporation | Techniques for virtual environment-based web client management |
US8706648B2 (en) | 2011-10-03 | 2014-04-22 | International Business Machines Corporation | Assessing social risk due to exposure from linked contacts |
US8712921B2 (en) | 2011-10-03 | 2014-04-29 | International Business Machines Corporation | Receiving security risk feedback from linked contacts due to a user's system actions and behaviors |
US8832265B2 (en) * | 2012-05-01 | 2014-09-09 | International Business Machines Corporation | Automated analysis system for modeling online business behavior and detecting outliers |
US8839375B2 (en) * | 2012-05-25 | 2014-09-16 | Microsoft Corporation | Managing distributed operating system physical resources |
US9455972B1 (en) * | 2013-09-30 | 2016-09-27 | Emc Corporation | Provisioning a mobile device with a security application on the fly |
US9667635B2 (en) * | 2015-03-26 | 2017-05-30 | Cisco Technology, Inc. | Creating three-party trust relationships for internet of things applications |
US10349304B2 (en) | 2015-09-23 | 2019-07-09 | Cloudflare, Inc. | Software defined dynamic filtering |
JP6693114B2 (en) * | 2015-12-15 | 2020-05-13 | 横河電機株式会社 | Controller and integrated production system |
US10601779B1 (en) * | 2016-06-21 | 2020-03-24 | Amazon Technologies, Inc. | Virtual private network (VPN) service backed by eventually consistent regional database |
US10257167B1 (en) | 2016-06-21 | 2019-04-09 | Amazon Technologies, Inc. | Intelligent virtual private network (VPN) client configured to manage common VPN sessions with distributed VPN service |
Citations (44)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5919258A (en) | 1996-02-08 | 1999-07-06 | Hitachi, Ltd. | Security system and method for computers connected to network |
US20010039579A1 (en) * | 1996-11-06 | 2001-11-08 | Milan V. Trcka | Network security and surveillance system |
US20020078209A1 (en) * | 2000-12-15 | 2002-06-20 | Luosheng Peng | Apparatus and methods for intelligently providing applications and data on a mobile device system |
US20020095607A1 (en) * | 2001-01-18 | 2002-07-18 | Catherine Lin-Hendel | Security protection for computers and computer-networks |
US20020103779A1 (en) * | 2000-05-19 | 2002-08-01 | Glenn Ricart | Migration of computer personalization information |
US20020116615A1 (en) * | 2000-12-07 | 2002-08-22 | Igt | Secured virtual network in a gaming environment |
US20030033419A1 (en) | 1999-09-01 | 2003-02-13 | Inventec Corporation | Modem having embedded network transmission protocols |
US20030055962A1 (en) * | 2001-07-06 | 2003-03-20 | Freund Gregor P. | System providing internet access management with router-based policy enforcement |
US20030083847A1 (en) * | 2001-10-31 | 2003-05-01 | Schertz Richard L. | User interface for presenting data for an intrusion protection system |
US20030084329A1 (en) * | 2001-10-31 | 2003-05-01 | Tarquini Richard Paul | Method, computer readable medium, and node for a three-layered intrusion prevention system for detecting network exploits |
US20030084320A1 (en) * | 2001-10-31 | 2003-05-01 | Tarquini Richard Paul | Network, method and computer readable medium for distributing security updates to select nodes on a network |
US20030097557A1 (en) * | 2001-10-31 | 2003-05-22 | Tarquini Richard Paul | Method, node and computer readable medium for performing multiple signature matching in an intrusion prevention system |
US20040022033A1 (en) * | 2002-07-31 | 2004-02-05 | Hsiu-O Hsu | Chassis locking apparatus capable of being unlocked spontaneously |
US6701440B1 (en) | 2000-01-06 | 2004-03-02 | Networks Associates Technology, Inc. | Method and system for protecting a computer using a remote e-mail scanning device |
US20040098623A1 (en) * | 2002-10-31 | 2004-05-20 | Secnap Network Security, Llc | Intrusion detection system |
US20040103317A1 (en) | 2002-11-22 | 2004-05-27 | Burns William D. | Method and apparatus for protecting secure credentials on an untrusted computer platform |
US20040107360A1 (en) * | 2002-12-02 | 2004-06-03 | Zone Labs, Inc. | System and Methodology for Policy Enforcement |
US20040158738A1 (en) | 2003-01-30 | 2004-08-12 | Fujitsu Limited | Security management device and security management method |
US20040167984A1 (en) * | 2001-07-06 | 2004-08-26 | Zone Labs, Inc. | System Providing Methodology for Access Control with Cooperative Enforcement |
JP2004246444A (en) | 2003-02-12 | 2004-09-02 | Hitachi Ltd | Security reference verification method, its execution device, and its processing program |
WO2004097584A2 (en) | 2003-04-28 | 2004-11-11 | P.G.I. Solutions Llc | Method and system for remote network security management |
US20040250114A1 (en) * | 2003-04-21 | 2004-12-09 | Ipolicy Networks Inc. | System and method for network quality of service protection on security breach detection |
US20040255153A1 (en) * | 2003-06-10 | 2004-12-16 | Huynh Lap T. | Application based intrusion detection |
JP2004361996A (en) | 2003-05-30 | 2004-12-24 | Fujitsu Ltd | Client evaluation method, client evaluation apparatus, service provision method, and service provision system |
US20050050334A1 (en) | 2003-08-29 | 2005-03-03 | Trend Micro Incorporated, A Japanese Corporation | Network traffic management by a virus/worm monitor in a distributed network |
CN1601974A (en) | 2004-10-09 | 2005-03-30 | 中国工商银行 | Computer auxilary security method and system |
US20050076227A1 (en) * | 2003-10-02 | 2005-04-07 | Koo-Hong Kang | In-line mode network intrusion detect and prevent system and method thereof |
US20050125526A1 (en) | 2003-12-09 | 2005-06-09 | Tsun-Sheng Chou | Method, apparatus and system of anti-virus software implementation |
JP2005157968A (en) | 2003-11-28 | 2005-06-16 | Nec Soft Ltd | Unauthorized connection detecting system |
JP2005197815A (en) | 2003-12-26 | 2005-07-21 | Japan Telecom Co Ltd | Network system and network control method |
US20050172155A1 (en) * | 1999-05-17 | 2005-08-04 | Invicta Networks, Inc. | Method of communications and communication network intrusion protection methods and intrusion attempt detection system |
US20050177868A1 (en) | 2003-07-11 | 2005-08-11 | Computer Associates Think, Inc. | Method and system for protecting against computer viruses |
US20050228695A1 (en) * | 2003-12-18 | 2005-10-13 | Fuji Photo Film Co., Ltd. | Hospital management apparatus and method, and computer-readable medium |
US7010807B1 (en) | 2001-04-13 | 2006-03-07 | Sonicwall, Inc. | System and method for network virus protection |
US20060053491A1 (en) * | 2004-03-01 | 2006-03-09 | Invensys Systems, Inc. | Process control methods and apparatus for intrusion detection, protection and network hardening |
US20060075467A1 (en) * | 2004-06-28 | 2006-04-06 | Sanda Frank S | Systems and methods for enhanced network access |
US20060095965A1 (en) * | 2004-10-29 | 2006-05-04 | Microsoft Corporation | Network security device and method for protecting a computing device in a networked environment |
US7047562B2 (en) * | 2001-06-21 | 2006-05-16 | Lockheed Martin Corporation | Conditioning of the execution of an executable program upon satisfaction of criteria |
US7058822B2 (en) | 2000-03-30 | 2006-06-06 | Finjan Software, Ltd. | Malicious mobile code runtime monitoring system and methods |
JP2006252256A (en) | 2005-03-11 | 2006-09-21 | Nec Soft Ltd | Network management system, method and program |
US20070044153A1 (en) | 2005-08-19 | 2007-02-22 | Sun Microsystems, Inc. | Computer security technique employing patch with detection and/or characterization mechanism for exploit of patched vulnerability |
US20070101405A1 (en) * | 2004-07-30 | 2007-05-03 | Engle Michael T | System and method for secure network connectivity |
US7269851B2 (en) | 2002-01-07 | 2007-09-11 | Mcafee, Inc. | Managing malware protection upon a computer network |
US7509642B1 (en) * | 2003-09-17 | 2009-03-24 | Sprint Communications Company L.P. | Method and system for automatically providing network-transaction-status updates |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7269651B2 (en) * | 2002-09-26 | 2007-09-11 | International Business Machines Corporation | E-business operations measurements |
-
2006
- 2006-09-07 US US11/517,165 patent/US8904529B2/en active Active
- 2006-09-07 EP EP06803027A patent/EP1934743A4/en not_active Withdrawn
- 2006-09-07 CN CN200680032656.5A patent/CN101258470B/en active Active
- 2006-09-07 WO PCT/US2006/034665 patent/WO2007030506A2/en active Application Filing
- 2006-09-07 JP JP2008530155A patent/JP4743911B2/en active Active
-
2014
- 2014-07-22 US US14/337,825 patent/US9325725B2/en active Active
Patent Citations (49)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5919258A (en) | 1996-02-08 | 1999-07-06 | Hitachi, Ltd. | Security system and method for computers connected to network |
US20010039579A1 (en) * | 1996-11-06 | 2001-11-08 | Milan V. Trcka | Network security and surveillance system |
US6981146B1 (en) * | 1999-05-17 | 2005-12-27 | Invicta Networks, Inc. | Method of communications and communication network intrusion protection methods and intrusion attempt detection system |
US7506166B2 (en) * | 1999-05-17 | 2009-03-17 | Invicta Networks, Inc. | Method of communications and communication network intrusion protection methods and intrusion attempt detection system |
US20050172155A1 (en) * | 1999-05-17 | 2005-08-04 | Invicta Networks, Inc. | Method of communications and communication network intrusion protection methods and intrusion attempt detection system |
US20030033419A1 (en) | 1999-09-01 | 2003-02-13 | Inventec Corporation | Modem having embedded network transmission protocols |
US6701440B1 (en) | 2000-01-06 | 2004-03-02 | Networks Associates Technology, Inc. | Method and system for protecting a computer using a remote e-mail scanning device |
US7058822B2 (en) | 2000-03-30 | 2006-06-06 | Finjan Software, Ltd. | Malicious mobile code runtime monitoring system and methods |
US20020103779A1 (en) * | 2000-05-19 | 2002-08-01 | Glenn Ricart | Migration of computer personalization information |
US20020116615A1 (en) * | 2000-12-07 | 2002-08-22 | Igt | Secured virtual network in a gaming environment |
US20020078209A1 (en) * | 2000-12-15 | 2002-06-20 | Luosheng Peng | Apparatus and methods for intelligently providing applications and data on a mobile device system |
US20020095607A1 (en) * | 2001-01-18 | 2002-07-18 | Catherine Lin-Hendel | Security protection for computers and computer-networks |
US7010807B1 (en) | 2001-04-13 | 2006-03-07 | Sonicwall, Inc. | System and method for network virus protection |
US7047562B2 (en) * | 2001-06-21 | 2006-05-16 | Lockheed Martin Corporation | Conditioning of the execution of an executable program upon satisfaction of criteria |
US20030055962A1 (en) * | 2001-07-06 | 2003-03-20 | Freund Gregor P. | System providing internet access management with router-based policy enforcement |
US20040167984A1 (en) * | 2001-07-06 | 2004-08-26 | Zone Labs, Inc. | System Providing Methodology for Access Control with Cooperative Enforcement |
US20030083847A1 (en) * | 2001-10-31 | 2003-05-01 | Schertz Richard L. | User interface for presenting data for an intrusion protection system |
US20030097557A1 (en) * | 2001-10-31 | 2003-05-22 | Tarquini Richard Paul | Method, node and computer readable medium for performing multiple signature matching in an intrusion prevention system |
US20030084329A1 (en) * | 2001-10-31 | 2003-05-01 | Tarquini Richard Paul | Method, computer readable medium, and node for a three-layered intrusion prevention system for detecting network exploits |
US20030084320A1 (en) * | 2001-10-31 | 2003-05-01 | Tarquini Richard Paul | Network, method and computer readable medium for distributing security updates to select nodes on a network |
US7269851B2 (en) | 2002-01-07 | 2007-09-11 | Mcafee, Inc. | Managing malware protection upon a computer network |
US20040022033A1 (en) * | 2002-07-31 | 2004-02-05 | Hsiu-O Hsu | Chassis locking apparatus capable of being unlocked spontaneously |
US20040098623A1 (en) * | 2002-10-31 | 2004-05-20 | Secnap Network Security, Llc | Intrusion detection system |
US20040103317A1 (en) | 2002-11-22 | 2004-05-27 | Burns William D. | Method and apparatus for protecting secure credentials on an untrusted computer platform |
US20040107360A1 (en) * | 2002-12-02 | 2004-06-03 | Zone Labs, Inc. | System and Methodology for Policy Enforcement |
US20040158738A1 (en) | 2003-01-30 | 2004-08-12 | Fujitsu Limited | Security management device and security management method |
JP2004246444A (en) | 2003-02-12 | 2004-09-02 | Hitachi Ltd | Security reference verification method, its execution device, and its processing program |
US20040250114A1 (en) * | 2003-04-21 | 2004-12-09 | Ipolicy Networks Inc. | System and method for network quality of service protection on security breach detection |
WO2004097584A2 (en) | 2003-04-28 | 2004-11-11 | P.G.I. Solutions Llc | Method and system for remote network security management |
JP2004361996A (en) | 2003-05-30 | 2004-12-24 | Fujitsu Ltd | Client evaluation method, client evaluation apparatus, service provision method, and service provision system |
US20040255153A1 (en) * | 2003-06-10 | 2004-12-16 | Huynh Lap T. | Application based intrusion detection |
US20050177868A1 (en) | 2003-07-11 | 2005-08-11 | Computer Associates Think, Inc. | Method and system for protecting against computer viruses |
US20050050334A1 (en) | 2003-08-29 | 2005-03-03 | Trend Micro Incorporated, A Japanese Corporation | Network traffic management by a virus/worm monitor in a distributed network |
US7509642B1 (en) * | 2003-09-17 | 2009-03-24 | Sprint Communications Company L.P. | Method and system for automatically providing network-transaction-status updates |
US20050076227A1 (en) * | 2003-10-02 | 2005-04-07 | Koo-Hong Kang | In-line mode network intrusion detect and prevent system and method thereof |
JP2005157968A (en) | 2003-11-28 | 2005-06-16 | Nec Soft Ltd | Unauthorized connection detecting system |
US20050125526A1 (en) | 2003-12-09 | 2005-06-09 | Tsun-Sheng Chou | Method, apparatus and system of anti-virus software implementation |
US20050228695A1 (en) * | 2003-12-18 | 2005-10-13 | Fuji Photo Film Co., Ltd. | Hospital management apparatus and method, and computer-readable medium |
JP2005197815A (en) | 2003-12-26 | 2005-07-21 | Japan Telecom Co Ltd | Network system and network control method |
US20060053491A1 (en) * | 2004-03-01 | 2006-03-09 | Invensys Systems, Inc. | Process control methods and apparatus for intrusion detection, protection and network hardening |
US7761923B2 (en) * | 2004-03-01 | 2010-07-20 | Invensys Systems, Inc. | Process control methods and apparatus for intrusion detection, protection and network hardening |
US7614083B2 (en) * | 2004-03-01 | 2009-11-03 | Invensys Systems, Inc. | Process control methods and apparatus for intrusion detection, protection and network hardening |
US20060294579A1 (en) * | 2004-03-01 | 2006-12-28 | Invensys Systems, Inc. | Process control methods and apparatus for intrusion detection, protection and network hardening |
US20060075467A1 (en) * | 2004-06-28 | 2006-04-06 | Sanda Frank S | Systems and methods for enhanced network access |
US20070101405A1 (en) * | 2004-07-30 | 2007-05-03 | Engle Michael T | System and method for secure network connectivity |
CN1601974A (en) | 2004-10-09 | 2005-03-30 | 中国工商银行 | Computer auxilary security method and system |
US20060095965A1 (en) * | 2004-10-29 | 2006-05-04 | Microsoft Corporation | Network security device and method for protecting a computing device in a networked environment |
JP2006252256A (en) | 2005-03-11 | 2006-09-21 | Nec Soft Ltd | Network management system, method and program |
US20070044153A1 (en) | 2005-08-19 | 2007-02-22 | Sun Microsystems, Inc. | Computer security technique employing patch with detection and/or characterization mechanism for exploit of patched vulnerability |
Non-Patent Citations (5)
Title |
---|
Extended Search Report dated Jan. 19, 2012 for PCT/US2006034665, 7 pages. |
Huang et al.; A cooperative intrusion detection system for ad hoc networks; Published in: Proceeding SASN '03 Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks; 2003; pp. 135-147; ACM Digital Library. * |
International Search Report, PCT/US2006/034665, Sep. 26, 2007, pp. 1-2. |
Mukherjee et al.; Network intrusion detection; Published in: Network, IEEE (vol. 8 , Issue: 3 ); Date of Publication: May-Jun. 1994; pp. 26-41; IEEE Xplore. * |
Ryosuke Sato, et al., "A Study on a Dynamic Reconfiguration System to Keep a Network in a Secure Condition", Report of Information Processing Society of Japan, vol. 2002 No. 12, Information Processing Society of Japan, Feb. 15, 2002, p. 169-174 *T5- English abstract only. |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10958557B2 (en) * | 2019-07-31 | 2021-03-23 | International Business Machines Corporation | Automated deployment of a private monitoring network |
US11496508B2 (en) | 2019-09-24 | 2022-11-08 | Target Brands, Inc. | Centralized security package and security threat management system |
Also Published As
Publication number | Publication date |
---|---|
US20140337977A1 (en) | 2014-11-13 |
CN101258470A (en) | 2008-09-03 |
JP2009507454A (en) | 2009-02-19 |
US20070056020A1 (en) | 2007-03-08 |
JP4743911B2 (en) | 2011-08-10 |
WO2007030506A2 (en) | 2007-03-15 |
EP1934743A4 (en) | 2012-02-22 |
US9325725B2 (en) | 2016-04-26 |
EP1934743A2 (en) | 2008-06-25 |
CN101258470B (en) | 2011-08-03 |
WO2007030506A3 (en) | 2007-11-29 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US8904529B2 (en) | Automated deployment of protection agents to devices connected to a computer network | |
US11621968B2 (en) | Intrusion detection using a heartbeat | |
US11722516B2 (en) | Using reputation to avoid false malware detections | |
US10334083B2 (en) | Systems and methods for malicious code detection | |
Fuchsberger | Intrusion detection systems and intrusion prevention systems | |
US9654489B2 (en) | Advanced persistent threat detection | |
US8949988B2 (en) | Methods for proactively securing a web application and apparatuses thereof | |
EP2850803B1 (en) | Integrity monitoring to detect changes at network device for use in secure network access | |
US7039950B2 (en) | System and method for network quality of service protection on security breach detection | |
GB2381722A (en) | intrusion detection (id) system which uses signature and squelch values to prevent bandwidth (flood) attacks on a server | |
TWI711939B (en) | Systems and methods for malicious code detection | |
EP3595257B1 (en) | Detecting suspicious sources, e.g. for configuring a distributed denial of service mitigation device | |
Singh | Intrusion detection system (IDS) and intrusion prevention system (IPS) for network security: a critical analysis | |
Mirashe et al. | Notice of Retraction: 3Why we need the intrusion detection prevention systems (IDPS) in it company | |
Yadav et al. | Comparison between HIDS and NIDS |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: INTERNET SECURITY SYSTEMS, INC., GEORGIA Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:WARD, MATTHEW;REEL/FRAME:018278/0785 Effective date: 20060907 |
|
AS | Assignment |
Owner name: INTERNATIONAL BUSINESS MACHINES CORPORATION, NEW Y Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:INTERNET SECURITY SYSTEMS, INC.;REEL/FRAME:019920/0128 Effective date: 20070928 Owner name: INTERNATIONAL BUSINESS MACHINES CORPORATION,NEW YO Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:INTERNET SECURITY SYSTEMS, INC.;REEL/FRAME:019920/0128 Effective date: 20070928 |
|
FEPP | Fee payment procedure |
Free format text: PAYER NUMBER DE-ASSIGNED (ORIGINAL EVENT CODE: RMPN); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY Free format text: PAYOR NUMBER ASSIGNED (ORIGINAL EVENT CODE: ASPN); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY |
|
STCF | Information on status: patent grant |
Free format text: PATENTED CASE |
|
MAFP | Maintenance fee payment |
Free format text: PAYMENT OF MAINTENANCE FEE, 4TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1551) Year of fee payment: 4 |
|
AS | Assignment |
Owner name: KYNDRYL, INC., NEW YORK Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:INTERNATIONAL BUSINESS MACHINES CORPORATION;REEL/FRAME:057885/0644 Effective date: 20210930 |
|
MAFP | Maintenance fee payment |
Free format text: PAYMENT OF MAINTENANCE FEE, 8TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1552); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY Year of fee payment: 8 |